<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Trying to configure a 2801 to let in VPN client PC's in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/trying-to-configure-a-2801-to-let-in-vpn-client-pc-s/m-p/1092071#M962578</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Oh man is it nice to see your reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was just going to remove the loopback until I saw:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Virtual-Template1 type tunnel&lt;/P&gt;&lt;P&gt; ip unnumbered Loopback0&lt;/P&gt;&lt;P&gt; tunnel mode ipsec ipv4&lt;/P&gt;&lt;P&gt; tunnel protection ipsec profile SDM_Profile1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't really know how it ties together but it sounds important.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;They originally landed my VPN on an outside interface. Then I moved it to that 192.168.254.o network like you suggested. It worked so I thought I was in the clear.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can I remove all the related loopback stuff?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 20 Nov 2008 19:57:28 GMT</pubDate>
    <dc:creator>Deepseadata</dc:creator>
    <dc:date>2008-11-20T19:57:28Z</dc:date>
    <item>
      <title>Trying to configure a 2801 to let in VPN client PC's</title>
      <link>https://community.cisco.com/t5/network-security/trying-to-configure-a-2801-to-let-in-vpn-client-pc-s/m-p/1092057#M962564</link>
      <description>&lt;P&gt;Hey there,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to configure my router to let a couple PC's get into my LAN remotely so we can do remote main. I have Cisco VPN client software and a SEC image on my router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried SDM to make VPN work but it screwed up my NAT entries and all my users lost internet access!! &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please have a look at my config. If you can give me any hints on what my it should look like to allow a few clients past my nat?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This config works with voice and remote access.&lt;/P&gt;&lt;P&gt;I'll be using it as a marker before I implement&lt;/P&gt;&lt;P&gt;VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh run&lt;/P&gt;&lt;P&gt;Building configuration...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current configuration : 2895 bytes&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;version 12.4&lt;/P&gt;&lt;P&gt;service timestamps debug datetime msec&lt;/P&gt;&lt;P&gt;service timestamps log datetime msec&lt;/P&gt;&lt;P&gt;no service password-encryption&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname BD2801&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot-start-marker&lt;/P&gt;&lt;P&gt;boot system flash c2801-adventerprisek9-mz.124-17.bin&lt;/P&gt;&lt;P&gt;boot-end-marker&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;logging buffered 51200 warnings&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;ip cef&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;voice-card 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;voice call carrier capacity active&lt;/P&gt;&lt;P&gt;voice rtp send-recv&lt;/P&gt;&lt;P&gt;voice dsp release early&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;voice service voip &lt;/P&gt;&lt;P&gt; fax protocol t38 nse force ls-redundancy 0 hs-redundancy 0 fallback cisco&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;fax interface-type fax-mail&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/0&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/1&lt;/P&gt;&lt;P&gt;description Starboard Stratos VSAT$FW_OUTSIDE$&lt;/P&gt;&lt;P&gt; ip address 10.20.46.20 255.255.255.0&lt;/P&gt;&lt;P&gt; ip nat outside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; no ip mroute-cache&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; full-duplex&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/3/0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/3/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/3/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/3/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; description $FW_INSIDE$&lt;/P&gt;&lt;P&gt; ip address 192.168.49.1 255.255.255.0&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Dialer0&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;router eigrp 1&lt;/P&gt;&lt;P&gt; network 192.168.49.0&lt;/P&gt;&lt;P&gt; auto-summary&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip local pool vpn_pool_1 192.168.50.150 192.168.50.151&lt;/P&gt;&lt;P&gt;ip default-gateway 10.20.46.1&lt;/P&gt;&lt;P&gt;ip forward-protocol nd&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 10.20.46.1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip http server&lt;/P&gt;&lt;P&gt;ip http authentication local&lt;/P&gt;&lt;P&gt;ip http secure-server&lt;/P&gt;&lt;P&gt;ip http timeout-policy idle 600 life 86400 requests 10000&lt;/P&gt;&lt;P&gt;ip nat pool MADNATPOOL 10.20.46.20 10.20.46.20 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;ip nat inside source list 1 pool MADNATPOOL overload&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list 1 permit 192.168.0.0 0.0.255.255&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;control-plane&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;voice-port 0/2/0&lt;/P&gt;&lt;P&gt; echo-cancel coverage 32&lt;/P&gt;&lt;P&gt; no comfort-noise&lt;/P&gt;&lt;P&gt; cptone GB&lt;/P&gt;&lt;P&gt; timeouts interdigit 3&lt;/P&gt;&lt;P&gt; music-threshold -70&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;voice-port 0/2/1&lt;/P&gt;&lt;P&gt; echo-cancel coverage 32&lt;/P&gt;&lt;P&gt; no comfort-noise&lt;/P&gt;&lt;P&gt; cptone GB&lt;/P&gt;&lt;P&gt; timeouts interdigit 3&lt;/P&gt;&lt;P&gt; music-threshold -70&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ccm-manager mgcp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;mgcp&lt;/P&gt;&lt;P&gt;mgcp call-agent 10.129.48.11 service-type mgcp version 0.1&lt;/P&gt;&lt;P&gt;mgcp dtmf-relay voip codec all mode nse&lt;/P&gt;&lt;P&gt;mgcp codec g729r8 packetization-period 60&lt;/P&gt;&lt;P&gt;mgcp playout adaptive 100 50 200&lt;/P&gt;&lt;P&gt;mgcp playout fax 500&lt;/P&gt;&lt;P&gt;no mgcp timer receive-rtcp&lt;/P&gt;&lt;P&gt;mgcp timer net-cont-test 1000&lt;/P&gt;&lt;P&gt;mgcp timer nse-response t38 1000&lt;/P&gt;&lt;P&gt;mgcp sdp simple&lt;/P&gt;&lt;P&gt;no mgcp fax t38 ecm&lt;/P&gt;&lt;P&gt;mgcp fax t38 nsf 000000&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;mgcp profile default&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dial-peer cor custom&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dial-peer voice 1 pots&lt;/P&gt;&lt;P&gt; service mgcpapp&lt;/P&gt;&lt;P&gt; port 0/2/0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dial-peer voice 2 pots&lt;/P&gt;&lt;P&gt; service mgcpapp&lt;/P&gt;&lt;P&gt; port 0/2/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;gateway &lt;/P&gt;&lt;P&gt; timer receive-rtp 1200&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;call-manager-fallback&lt;/P&gt;&lt;P&gt; max-conferences 4 gain -6&lt;/P&gt;&lt;P&gt; ip source-address 10.20.46.20 port 2000&lt;/P&gt;&lt;P&gt; max-ephones 24&lt;/P&gt;&lt;P&gt; max-dn 24&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt;line aux 0&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; privilege level 15&lt;/P&gt;&lt;P&gt; transport input telnet ssh&lt;/P&gt;&lt;P&gt;line vty 5 15&lt;/P&gt;&lt;P&gt; privilege level 15&lt;/P&gt;&lt;P&gt; transport input telnet ssh&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;scheduler allocate 20000 1000&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 11:06:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trying-to-configure-a-2801-to-let-in-vpn-client-pc-s/m-p/1092057#M962564</guid>
      <dc:creator>Deepseadata</dc:creator>
      <dc:date>2020-02-21T11:06:44Z</dc:date>
    </item>
    <item>
      <title>Re: Trying to configure a 2801 to let in VPN client PC's</title>
      <link>https://community.cisco.com/t5/network-security/trying-to-configure-a-2801-to-let-in-vpn-client-pc-s/m-p/1092058#M962565</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You have forgotten to include the VPN config?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;follow the below config example:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/sw/secursw/ps5318/products_configuration_example09186a00806ad10e.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps5318/products_configuration_example09186a00806ad10e.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this is not specific or does not fit - the below link has all config examples for your platform:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps5854/prod_configuration_examples_list.html" target="_blank"&gt;http://www.cisco.com/en/US/products/ps5854/prod_configuration_examples_list.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Nov 2008 11:00:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trying-to-configure-a-2801-to-let-in-vpn-client-pc-s/m-p/1092058#M962565</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2008-11-19T11:00:47Z</dc:date>
    </item>
    <item>
      <title>Re: Trying to configure a 2801 to let in VPN client PC's</title>
      <link>https://community.cisco.com/t5/network-security/trying-to-configure-a-2801-to-let-in-vpn-client-pc-s/m-p/1092059#M962566</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the reply! Ok so now I have a working VPN scenario.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My VPN Client can now get to some areas of my inside network. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to make sure NAT lets me get to all of my internal lan that is behind the router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone help me adjust my NAT?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;inet--&amp;gt; 10.20.46.20(router)192.168.49.1--&amp;gt;168.192.49.2(L3 3560 switch)192.168.50.0&lt;/P&gt;&lt;P&gt;                             192.168.51.0&lt;/P&gt;&lt;P&gt;                             192.168.52.0&lt;/P&gt;&lt;P&gt;                             etc.&lt;/P&gt;&lt;P&gt;Here's the router config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication login default local&lt;/P&gt;&lt;P&gt;aaa authentication login sdm_vpn_xauth_ml_1 local&lt;/P&gt;&lt;P&gt;aaa authorization exec default local &lt;/P&gt;&lt;P&gt; aaa authorization network sdm_vpn_group_ml_1 local &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;ip cef&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no ip dhcp use vrf connected&lt;/P&gt;&lt;P&gt;ip dhcp excluded-address 10.20.46.1 10.20.46.30&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip dhcp pool S_LAN&lt;/P&gt;&lt;P&gt;   network 10.20.46.0 255.255.255.0&lt;/P&gt;&lt;P&gt;   default-router 10.20.46.1 &lt;/P&gt;&lt;P&gt;   dns-server &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip domain name ocean-group.net&lt;/P&gt;&lt;P&gt;ip name-server&lt;/P&gt;&lt;P&gt;ip name-server &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;voice-card 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;voice call carrier capacity active&lt;/P&gt;&lt;P&gt;voice rtp send-recv&lt;/P&gt;&lt;P&gt;voice dsp release early&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;voice service voip &lt;/P&gt;&lt;P&gt; fax protocol t38 nse force ls-redundancy 0 hs-redundancy 0 fallback cisco&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto pki trustpoint TP-self-signed-3884018817&lt;/P&gt;&lt;P&gt; enrollment selfsigned&lt;/P&gt;&lt;P&gt; subject-name cn=IOS-Self-Signed-Certificate-3884018817&lt;/P&gt;&lt;P&gt; revocation-check none&lt;/P&gt;&lt;P&gt; rsakeypair TP-self-signed-3884018817&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto pki certificate chain TP-self-signed-3884018817&lt;/P&gt;&lt;P&gt; certificate self-signed 0D&lt;/P&gt;&lt;P&gt;  quit&lt;/P&gt;&lt;P&gt;fax interface-type fax-mail&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;archive&lt;/P&gt;&lt;P&gt; log config&lt;/P&gt;&lt;P&gt;  hidekeys&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto isakmp policy 1&lt;/P&gt;&lt;P&gt; encr 3des&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto isakmp client configuration group madsummer&lt;/P&gt;&lt;P&gt; key v@ncouver&lt;/P&gt;&lt;P&gt; pool SDM_POOL_1&lt;/P&gt;&lt;P&gt; include-local-lan&lt;/P&gt;&lt;P&gt; max-users 10&lt;/P&gt;&lt;P&gt; netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;crypto isakmp profile sdm-ike-profile-1&lt;/P&gt;&lt;P&gt;   match identity group madsummer&lt;/P&gt;&lt;P&gt;   client authentication list sdm_vpn_xauth_ml_1&lt;/P&gt;&lt;P&gt;isakmp authorization list sdm_vpn_group_ml_1&lt;/P&gt;&lt;P&gt;   client configuration address respond&lt;/P&gt;&lt;P&gt;   virtual-template 1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto ipsec profile SDM_Profile1&lt;/P&gt;&lt;P&gt; set transform-set ESP-3DES-SHA &lt;/P&gt;&lt;P&gt; set isakmp-profile sdm-ike-profile-1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Loopback0&lt;/P&gt;&lt;P&gt; ip address 194.217.5.38 255.255.255.255&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/1&lt;/P&gt;&lt;P&gt; description Starboard Stratos VSAT$FW_OUTSIDE$&lt;/P&gt;&lt;P&gt; ip address 10.20.46.20 255.255.255.0&lt;/P&gt;&lt;P&gt; ip nat outside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; no ip mroute-cache&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; full-duplex&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/3/0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/3/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/3/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/3/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Virtual-Template1 type tunnel&lt;/P&gt;&lt;P&gt; ip unnumbered Loopback0&lt;/P&gt;&lt;P&gt; tunnel mode ipsec ipv4&lt;/P&gt;&lt;P&gt; tunnel protection ipsec profile SDM_Profile1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; description $FW_INSIDE$&lt;/P&gt;&lt;P&gt; ip address 192.168.49.1 255.255.255.0&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;router eigrp 1&lt;/P&gt;&lt;P&gt; network 192.168.0.0&lt;/P&gt;&lt;P&gt; network 192.168.49.0&lt;/P&gt;&lt;P&gt; auto-summary&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip local pool SDM_POOL_1 10.20.46.200 10.20.46.220&lt;/P&gt;&lt;P&gt;ip default-gateway 10.20.46.1&lt;/P&gt;&lt;P&gt;ip forward-protocol nd&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 10.20.46.1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip http server&lt;/P&gt;&lt;P&gt;ip http authentication local&lt;/P&gt;&lt;P&gt;ip http secure-server&lt;/P&gt;&lt;P&gt;ip http timeout-policy idle 600 life 86400 requests 10000&lt;/P&gt;&lt;P&gt;ip nat pool MADNATPOOL 10.20.46.20 10.20.46.20 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;ip nat inside source list 1 pool MADNATPOOL overload&lt;/P&gt;&lt;P&gt;access-list 1 permit 192.168.0.0 0.0.255.255&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Nov 2008 13:10:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trying-to-configure-a-2801-to-let-in-vpn-client-pc-s/m-p/1092059#M962566</guid>
      <dc:creator>Deepseadata</dc:creator>
      <dc:date>2008-11-19T13:10:46Z</dc:date>
    </item>
    <item>
      <title>Re: Trying to configure a 2801 to let in VPN client PC's</title>
      <link>https://community.cisco.com/t5/network-security/trying-to-configure-a-2801-to-let-in-vpn-client-pc-s/m-p/1092060#M962567</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;why have you configured the VPN pool out of 10.x.x.x IP addresses?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would use a 192.168.x.x address pool, then configure my nat something like&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 deny ip 192.168.x.x 0.0.255.255 192.168.x.x 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 101 permit 192.168.0.0 0.0.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source list 101 pool MADNATPOOL overload&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Nov 2008 13:23:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trying-to-configure-a-2801-to-let-in-vpn-client-pc-s/m-p/1092060#M962567</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2008-11-19T13:23:37Z</dc:date>
    </item>
    <item>
      <title>Re: Trying to configure a 2801 to let in VPN client PC's</title>
      <link>https://community.cisco.com/t5/network-security/trying-to-configure-a-2801-to-let-in-vpn-client-pc-s/m-p/1092061#M962568</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well actually my Public IP is something different than my outside router interface. My ISP dropped the VPN down on the 10.20.46.20. The good thing is that now I can get in. But I can't get full roam of all my vlans... although I can get all over one of them 192.168.50.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to terminate the vpn on an inside address but I'm afraid!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will those entries you gave me affect any of my users leaving from my network?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Nov 2008 13:56:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trying-to-configure-a-2801-to-let-in-vpn-client-pc-s/m-p/1092061#M962568</guid>
      <dc:creator>Deepseadata</dc:creator>
      <dc:date>2008-11-19T13:56:04Z</dc:date>
    </item>
    <item>
      <title>Re: Trying to configure a 2801 to let in VPN client PC's</title>
      <link>https://community.cisco.com/t5/network-security/trying-to-configure-a-2801-to-let-in-vpn-client-pc-s/m-p/1092062#M962569</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is it possible to create the vpn pool on a subnet that isn't on the router? If I could get my vpn sent in past the router outside int 10.20.46.20 past the inside int of 192.168.49.1 and to plop it down inside my L3 switch on the 192.168.50.0 network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can I help you help me? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm going grey over here.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Nov 2008 14:03:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trying-to-configure-a-2801-to-let-in-vpn-client-pc-s/m-p/1092062#M962569</guid>
      <dc:creator>Deepseadata</dc:creator>
      <dc:date>2008-11-19T14:03:55Z</dc:date>
    </item>
    <item>
      <title>Re: Trying to configure a 2801 to let in VPN client PC's</title>
      <link>https://community.cisco.com/t5/network-security/trying-to-configure-a-2801-to-let-in-vpn-client-pc-s/m-p/1092063#M962570</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can give the VPN pool and IP address of 192.168.254.0/24 - as long as the router, and the internal layer 3 routing device know that 192.168.254.0/24 is on the 2801 - no issues.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's then a simple matter of routing!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Nov 2008 14:08:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trying-to-configure-a-2801-to-let-in-vpn-client-pc-s/m-p/1092063#M962570</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2008-11-19T14:08:19Z</dc:date>
    </item>
    <item>
      <title>Re: Trying to configure a 2801 to let in VPN client PC's</title>
      <link>https://community.cisco.com/t5/network-security/trying-to-configure-a-2801-to-let-in-vpn-client-pc-s/m-p/1092064#M962571</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm not sure how to get that address on the router only because I don't have any more interfaces I can use. I think I misunderstood.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do I need to use a seperate subnet for the vpn clients or can I have them join an existing vlan the switch is routing?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can post the switch config if you felt like looking at them.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Nov 2008 14:28:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trying-to-configure-a-2801-to-let-in-vpn-client-pc-s/m-p/1092064#M962571</guid>
      <dc:creator>Deepseadata</dc:creator>
      <dc:date>2008-11-19T14:28:15Z</dc:date>
    </item>
    <item>
      <title>Re: Trying to configure a 2801 to let in VPN client PC's</title>
      <link>https://community.cisco.com/t5/network-security/trying-to-configure-a-2801-to-let-in-vpn-client-pc-s/m-p/1092065#M962572</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have the private network 192.168.49.0 and the only hosts on it are the router's internal int and the switch's (I'll call it) outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could I plop the VPN users down into there with say a pool of 192.168.49.5 to 192.168.49.10?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Nov 2008 14:36:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trying-to-configure-a-2801-to-let-in-vpn-client-pc-s/m-p/1092065#M962572</guid>
      <dc:creator>Deepseadata</dc:creator>
      <dc:date>2008-11-19T14:36:32Z</dc:date>
    </item>
    <item>
      <title>Re: Trying to configure a 2801 to let in VPN client PC's</title>
      <link>https://community.cisco.com/t5/network-security/trying-to-configure-a-2801-to-let-in-vpn-client-pc-s/m-p/1092066#M962573</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;whoa - hold on mate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You do not need to have a physical interface for VPN users.  If you terminate the VPN on the outside interface (which is the norm) then you assign the VPN users an IP address from say 192.168.254.0/24 - the router KNOWS that this is a local pool.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The traffic from the VPN clients will enter the network with a 192.168.254.x address, from the routers inside interface.  For this to work all you have to do, is make SURE the rest of your internal network knows that 192.168.254.0/24 lives on the router, just like a static route.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Nov 2008 14:40:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trying-to-configure-a-2801-to-let-in-vpn-client-pc-s/m-p/1092066#M962573</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2008-11-19T14:40:16Z</dc:date>
    </item>
    <item>
      <title>Re: Trying to configure a 2801 to let in VPN client PC's</title>
      <link>https://community.cisco.com/t5/network-security/trying-to-configure-a-2801-to-let-in-vpn-client-pc-s/m-p/1092067#M962574</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; sorry about that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So here's what I'm going to do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Change &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip local pool SDM_POOL_1 10.20.46.200 10.20.46.220&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;to&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip local pool SDM_POOL_1 192.168.254.200 192.168.254.220&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and that's it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Whew! that sounds easy as pie!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would the routing already be covered by&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;router eigrp 1&lt;/P&gt;&lt;P&gt; network 192.168.0.0?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or do I need to put a static route of maybe&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 192.168.0.0 255.255.0.0 10.20.46.20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm kinda shooting in the dark right now. Sorry about my ignorance.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Nov 2008 14:49:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trying-to-configure-a-2801-to-let-in-vpn-client-pc-s/m-p/1092067#M962574</guid>
      <dc:creator>Deepseadata</dc:creator>
      <dc:date>2008-11-19T14:49:50Z</dc:date>
    </item>
    <item>
      <title>Re: Trying to configure a 2801 to let in VPN client PC's</title>
      <link>https://community.cisco.com/t5/network-security/trying-to-configure-a-2801-to-let-in-vpn-client-pc-s/m-p/1092068#M962575</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey hey!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It worked. It's funny how less scary things are once you've seen them work once.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm able to now get to all the hosts I need to manage remotely.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now I'm onto the next tasks. QoS &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll be trying to give the client full bandwidth when it connects to do the maint.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See you in the other forums. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You rock, Andrew!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot. I mean it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Nov 2008 16:01:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trying-to-configure-a-2801-to-let-in-vpn-client-pc-s/m-p/1092068#M962575</guid>
      <dc:creator>Deepseadata</dc:creator>
      <dc:date>2008-11-19T16:01:22Z</dc:date>
    </item>
    <item>
      <title>Re: Trying to configure a 2801 to let in VPN client PC's</title>
      <link>https://community.cisco.com/t5/network-security/trying-to-configure-a-2801-to-let-in-vpn-client-pc-s/m-p/1092069#M962576</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Crap!!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I thought everything worked until we found the voice stopped working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Everytime I entered:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Loopback0&lt;/P&gt;&lt;P&gt; ip address 214.27.53.58 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I could only talk in one direction! &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any way around using this??? With only a couple more days. I'm really up against the wall now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication login default local&lt;/P&gt;&lt;P&gt;aaa authentication login sdm_vpn_xauth_ml_1 local&lt;/P&gt;&lt;P&gt;aaa authorization exec default local &lt;/P&gt;&lt;P&gt;aaa authorization network sdm_vpn_group_ml_1 local &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;ip cef&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no ip dhcp use vrf connected&lt;/P&gt;&lt;P&gt;ip dhcp excluded-address 10.20.46.1 10.20.46.30&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip dhcp pool Stratos_LAN&lt;/P&gt;&lt;P&gt;   network 10.20.46.0 255.255.255.0&lt;/P&gt;&lt;P&gt;   default-router 10.20.46.1 &lt;/P&gt;&lt;P&gt;   dns-server 158.152.1.58 158.152.1.43 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;voice-card 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;voice call carrier capacity active&lt;/P&gt;&lt;P&gt;voice rtp send-recv&lt;/P&gt;&lt;P&gt;voice dsp release early&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;voice service voip &lt;/P&gt;&lt;P&gt; fax protocol t38 nse force ls-redundancy 0 hs-redundancy 0 fallback cisco&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto pki trustpoint TP-self-signed-3884018817&lt;/P&gt;&lt;P&gt; enrollment selfsigned&lt;/P&gt;&lt;P&gt; subject-name cn=IOS-Self-Signed-Certificate-3884018817&lt;/P&gt;&lt;P&gt; revocation-check none&lt;/P&gt;&lt;P&gt; rsakeypair TP-self-signed-3884018817&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto pki certificate chain TP-self-signed-3884018817&lt;/P&gt;&lt;P&gt; certificate self-signed 0D&lt;/P&gt;&lt;P&gt;  3082023E 308201A7 A0030201 0202010D 300D0609 2A864886 F70D0101 04050030 &lt;/P&gt;&lt;P&gt;  31312F30 2D060355 04031326 494F532D &lt;/P&gt;&lt;P&gt;  quit&lt;/P&gt;&lt;P&gt;fax interface-type fax-mail&lt;/P&gt;&lt;P&gt;username privilege 15&lt;/P&gt;&lt;P&gt;username privilege 15&lt;/P&gt;&lt;P&gt;archive&lt;/P&gt;&lt;P&gt; log config&lt;/P&gt;&lt;P&gt;  hidekeys&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto isakmp policy 1&lt;/P&gt;&lt;P&gt; encr 3des&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto isakmp client configuration group madsummer&lt;/P&gt;&lt;P&gt; key &lt;/P&gt;&lt;P&gt; pool SDM_POOL_1&lt;/P&gt;&lt;P&gt; include-local-lan&lt;/P&gt;&lt;P&gt; max-users 10&lt;/P&gt;&lt;P&gt; netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;crypto isakmp profile sdm-ike-profile-1&lt;/P&gt;&lt;P&gt;   match identity group mad&lt;/P&gt;&lt;P&gt;   client authentication list sdm_vpn_xauth_ml_1&lt;/P&gt;&lt;P&gt;   isakmp authorization list sdm_vpn_group_ml_1&lt;/P&gt;&lt;P&gt;   client configuration address respond&lt;/P&gt;&lt;P&gt;   virtual-template 1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto ipsec profile SDM_Profile1&lt;/P&gt;&lt;P&gt; set transform-set ESP-3DES-SHA &lt;/P&gt;&lt;P&gt; set isakmp-profile sdm-ike-profile-1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Loopback0&lt;/P&gt;&lt;P&gt; ip address 214.27.53.58 255.255.255.255&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/0&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/1&lt;/P&gt;&lt;P&gt; description Starboard Stratos VSAT$FW_OUTSIDE$&lt;/P&gt;&lt;P&gt; ip address 10.20.46.20 255.255.255.0&lt;/P&gt;&lt;P&gt; ip nat outside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; no ip mroute-cache&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; full-duplex&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/3/0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/3/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/3/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/3/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Virtual-Template1 type tunnel&lt;/P&gt;&lt;P&gt; ip unnumbered Loopback0&lt;/P&gt;&lt;P&gt; tunnel mode ipsec ipv4&lt;/P&gt;&lt;P&gt; tunnel protection ipsec profile SDM_Profile1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; interface Vlan1&lt;/P&gt;&lt;P&gt; description $FW_INSIDE$&lt;/P&gt;&lt;P&gt; ip address 192.168.49.1 255.255.255.0&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;router eigrp 1&lt;/P&gt;&lt;P&gt; network 192.168.0.0&lt;/P&gt;&lt;P&gt; network 192.168.49.0&lt;/P&gt;&lt;P&gt; auto-summary&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip local pool SDM_POOL_1 192.168.254.160 192.168.254.170&lt;/P&gt;&lt;P&gt;ip default-gateway 10.20.46.1&lt;/P&gt;&lt;P&gt;ip forward-protocol nd&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 10.20.46.1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip http server&lt;/P&gt;&lt;P&gt;ip http authentication local&lt;/P&gt;&lt;P&gt;ip http secure-server&lt;/P&gt;&lt;P&gt;ip http timeout-policy idle 600 life 86400 requests 10000&lt;/P&gt;&lt;P&gt;ip nat pool MADNATPOOL 10.20.46.20 10.20.46.20 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;ip nat inside source list 1 pool MADNATPOOL overload&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list 1 permit 192.168.0.0 0.0.255.255&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Nov 2008 19:39:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trying-to-configure-a-2801-to-let-in-vpn-client-pc-s/m-p/1092069#M962576</guid>
      <dc:creator>Deepseadata</dc:creator>
      <dc:date>2008-11-20T19:39:51Z</dc:date>
    </item>
    <item>
      <title>Re: Trying to configure a 2801 to let in VPN client PC's</title>
      <link>https://community.cisco.com/t5/network-security/trying-to-configure-a-2801-to-let-in-vpn-client-pc-s/m-p/1092070#M962577</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Errrm why are you configuring a loopback on an internal virtual interface with an external IP address - that relates to voice?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The way around it is - do not configure the loopback interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Nov 2008 19:47:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trying-to-configure-a-2801-to-let-in-vpn-client-pc-s/m-p/1092070#M962577</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2008-11-20T19:47:45Z</dc:date>
    </item>
    <item>
      <title>Re: Trying to configure a 2801 to let in VPN client PC's</title>
      <link>https://community.cisco.com/t5/network-security/trying-to-configure-a-2801-to-let-in-vpn-client-pc-s/m-p/1092071#M962578</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Oh man is it nice to see your reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was just going to remove the loopback until I saw:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Virtual-Template1 type tunnel&lt;/P&gt;&lt;P&gt; ip unnumbered Loopback0&lt;/P&gt;&lt;P&gt; tunnel mode ipsec ipv4&lt;/P&gt;&lt;P&gt; tunnel protection ipsec profile SDM_Profile1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't really know how it ties together but it sounds important.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;They originally landed my VPN on an outside interface. Then I moved it to that 192.168.254.o network like you suggested. It worked so I thought I was in the clear.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can I remove all the related loopback stuff?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Nov 2008 19:57:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trying-to-configure-a-2801-to-let-in-vpn-client-pc-s/m-p/1092071#M962578</guid>
      <dc:creator>Deepseadata</dc:creator>
      <dc:date>2008-11-20T19:57:28Z</dc:date>
    </item>
    <item>
      <title>Re: Trying to configure a 2801 to let in VPN client PC's</title>
      <link>https://community.cisco.com/t5/network-security/trying-to-configure-a-2801-to-let-in-vpn-client-pc-s/m-p/1092072#M962579</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Virtual-Templates are not my bag to be honest but a quick search on Cisco:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6635/prod_white_paper0900aecd803645b5.html" target="_blank"&gt;http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6635/prod_white_paper0900aecd803645b5.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I read the above - to be honest as you are only using the VPN for remote client access, I would say you can remove the loopback interface config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Nov 2008 20:03:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trying-to-configure-a-2801-to-let-in-vpn-client-pc-s/m-p/1092072#M962579</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2008-11-20T20:03:15Z</dc:date>
    </item>
    <item>
      <title>Re: Trying to configure a 2801 to let in VPN client PC's</title>
      <link>https://community.cisco.com/t5/network-security/trying-to-configure-a-2801-to-let-in-vpn-client-pc-s/m-p/1092073#M962580</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll give it a try. It really sucks that I'm on the yacht right now... the WAN link is so slow that it makes it hard for me to research much. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll just try to remove it and see what happens. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks dude.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Nov 2008 20:09:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trying-to-configure-a-2801-to-let-in-vpn-client-pc-s/m-p/1092073#M962580</guid>
      <dc:creator>Deepseadata</dc:creator>
      <dc:date>2008-11-20T20:09:39Z</dc:date>
    </item>
    <item>
      <title>Re: Trying to configure a 2801 to let in VPN client PC's</title>
      <link>https://community.cisco.com/t5/network-security/trying-to-configure-a-2801-to-let-in-vpn-client-pc-s/m-p/1092074#M962581</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;On a yacht huh! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yeah I can see how that can be bad!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just remove the loopback interface, see what happens&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Nov 2008 20:16:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trying-to-configure-a-2801-to-let-in-vpn-client-pc-s/m-p/1092074#M962581</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2008-11-20T20:16:59Z</dc:date>
    </item>
    <item>
      <title>Re: Trying to configure a 2801 to let in VPN client PC's</title>
      <link>https://community.cisco.com/t5/network-security/trying-to-configure-a-2801-to-let-in-vpn-client-pc-s/m-p/1092075#M962582</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I needed to get off the boat to come to a place where I could test remotely.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It timed out... I'm not sure if that's because of the lack of loopback or what.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I wiped it out and now I may have opened up another can of worms with the crypto pki chain... it looks different now. I'm not sure if my client is expecting to use the previously generated key.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Time to read again... wow this is hard.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Nov 2008 22:53:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trying-to-configure-a-2801-to-let-in-vpn-client-pc-s/m-p/1092075#M962582</guid>
      <dc:creator>Deepseadata</dc:creator>
      <dc:date>2008-11-20T22:53:22Z</dc:date>
    </item>
  </channel>
</rss>

